Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Securing E-Business Applications and Communications - Jonathan S. Held, John Bowers

Securing E-Business Applications and Communications

Buch | Softcover
358 Seiten
2001
Auerbach (Verlag)
978-0-8493-0963-2 (ISBN)
CHF 199,95 inkl. MwSt
  • Titel z.Zt. nicht lieferbar
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
Presents the process of setting up a secure E-commerce Web site. This book includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. It highlights the plethora of encryption algorithms that are instrumental in securing data. It illustrates how to use the technologies to support secure transactions.
Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data.
Rather than burden you with the intimate details of these algorithms, the authors cover "the pieces" that so many other texts miss. Together, you and the authors develop a site from concept to implementation. Numerous coding examples illustrate the how-tos of the most current technologies - from Microsoft, Sun, and others - to support secure transactions. They also explore the most popular web servers, the technologies that drive them, and commercial utilities that can be used to manage them remotely.
While there are plenty of expensive, shrink-wrapped packages that claim to do everything you need, nothing is better than rolling up your sleeves, getting your hands dirty, and learning how the technology works. Spend some time doing that now and you'll save yourself a bundle of money over the long haul. There is no other comprehensive, step-by-step guide on how to create a secure e-commerce site than Securing E-Business Applications and Communications. Without it, you will spend countless hours finding the information it contains.

Jonathan S. Held, John Bowers

E-COMMERCE: THE WHAT AND THE WHY. The Digital Revolution. Security. Encryption. Standards. Summary. A Prelude of Things to Come. THE NEED FOR SECURITY: LEARNING FROM OTHER'S MISTAKES. A Tangled Web Is Weaved. CGI by Example. Hello PHF. Thinking Like a Hacker. Adding Automation to the Task. Properly Handling CGI. Keep the Noise Down. Know What Thy Foe Knows. PASSWORDS: SECURITY'S WEAKEST LINK. The Heart of the Problem. Contending with the Internet. Statistics Don't Lie. The Mathematics of Passwords. UNIX and Linux. Windows 95/Windows 98. Windows NT 4.0. Windows 2000. UNIX/Linux. Recommendations. Electronic Business (E-Business). Arpanet-Precursor of a Digital Revolution. Awash in Buzzwords. Business and the Internet. E-Business Models. DATA ENCRYPTION. Monoalphabetic Substitution. Polyalphabetic Substitution. Commercial Encryption Standards. Closing Thoughts. HASH ALGORITHMS. Message Digest (MD) Hash Functions. SHA-1 Hash Function. Understanding the Java Hashing Program. A Practical Web-Based Java Cryptography Example. Concluding Thoughts. AUTHENTICATION PROTOCOLS AND PRETTY GOOD PRIVACY (PGP). Kerberos History. X.509 Certificate Introduction and History. Concluding Thoughts. SECURE REMOTE MANAGEMENT. The Windows 2000 Telnet Service. Secure Shell (SSH-1 And SSH-2). FTP, Secure FTP, and SCP. Virtual Network Comptuer (VNC). Virtual Private Networking (VPN). Concluding Thoughts. THE TECHNOLOGY THAT ENABLES E-COMMERCE. Developing Client/Server RDBMS Applications Using Java Servlets and JDBC. JDBC Applications. Web Servers. Microsoft's Active Server. Command Object. Concluding Thoughts. CONCLUSION. Some Final Key Points.

Erscheint lt. Verlag 22.6.2001
Zusatzinfo 175 Tables, black and white; 118 Halftones, black and white; 50 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 178 x 254 mm
Gewicht 636 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Software Entwicklung
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-8493-0963-8 / 0849309638
ISBN-13 978-0-8493-0963-2 / 9780849309632
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20